External Audit

  1. Vulnerability Assessment: Conduct a comprehensive vulnerability assessment to identify any known vulnerabilities in the website’s software, configurations, or infrastructure.
  2. Penetration Testing: Perform a penetration test to identify potential attack vectors that could be exploited by attackers.
  3. Web Application Firewall (WAF) Configuration Review: Review the WAF configuration to ensure it is properly configured and effective at blocking malicious traffic.
  4. SSL/TLS Certificate Validation: Validate the SSL/TLS certificate to ensure it is properly installed and configured, and to identify any potential vulnerabilities.
  5. Network Security Assessment: Conduct a network security assessment to identify any vulnerabilities in the website’s network infrastructure.
  6. Password Policy Assessment: Evaluate the website’s password policy to ensure it is strong enough to resist brute-force attacks.
  7. Data Backup and Recovery Assessment: Evaluate the website’s data backup and recovery plan to ensure it is effective and up-to-date.
  8. Incident Response Assessment: Review the website’s incident response plan to ensure it is effective and up-to-date, and that employees are trained on how to respond to security incidents.

R 10,000.00 – R50,000.00


Architecture Audit

  1. Network Scanning: Conduct a comprehensive network scan to identify all devices on the network and potential vulnerabilities.
  2. Penetration Testing: Perform a penetration test to identify potential attack vectors that could be exploited by attackers.
  3. Firewall Configuration Review: Review the firewall configuration to ensure it is properly configured and effective at blocking malicious traffic.
  4. Password Policy Assessment: Evaluate the organization’s password policy to ensure it is strong enough to resist brute-force attacks.
  5. Endpoint Security Assessment: Assess the security of all endpoints (e.g. laptops, desktops, servers) to ensure they are properly secured and patched.
  6. Patch Management Assessment: Evaluate the organization’s patch management process to ensure all devices are up-to-date with the latest security patches.
  7. Employee Security Awareness Assessment: Test employees’ security awareness to determine if they are aware of and following security best practices.
  8. Access Control Assessment: Assess the organization’s access control policies and procedures to ensure only authorized individuals have access to sensitive data.
  9. Data Backup and Recovery Assessment: Evaluate the organization’s data backup and recovery plan to ensure it is effective and up-to-date.
  10. Incident Response Assessment: Review the organization’s incident response plan to ensure it is effective and up-to-date, and that employees are trained on how to respond to security incidents.

R 25,000.00 – R80,000.00*

*This excludes any travel costs


Full Security Audit

  1. Vulnerability Assessment: Conduct a comprehensive vulnerability assessment to identify any known vulnerabilities in the system’s software, configurations, or infrastructure.
  2. Penetration Testing: Perform a penetration test to identify potential attack vectors that could be exploited by attackers.
  3. Firewall Configuration Review: Review the firewall configuration to ensure it is properly configured and effective at blocking malicious traffic.
  4. Password Policy Assessment: Evaluate the system’s password policy to ensure it is strong enough to resist brute-force attacks.
  5. Endpoint Security Assessment: Assess the security of all endpoints (e.g. laptops, desktops, servers) to ensure they are properly secured and patched.
  6. Patch Management Assessment: Evaluate the system’s patch management process to ensure all devices are up-to-date with the latest security patches.
  7. Employee Security Awareness Assessment: Test employees’ security awareness to determine if they are aware of and following security best practices.
  8. Access Control Assessment: Assess the system’s access control policies and procedures to ensure only authorized individuals have access to sensitive data.
  9. Data Backup and Recovery Assessment: Evaluate the system’s data backup and recovery plan to ensure it is effective and up-to-date.
  10. Incident Response Assessment: Review the system’s incident response plan to ensure it is effective and up-to-date, and that employees are trained on how to respond to security incidents.
  11. Web Application Security Assessment: Test the security of web applications that are hosted on the system.
  12. Wireless Network Security Assessment: Evaluate the security of the wireless network to ensure it is properly secured and protected from unauthorized access.
  13. Network Security Assessment: Conduct a network security assessment to identify any vulnerabilities in the system’s network infrastructure.
  14. Physical Security Assessment: Evaluate the physical security measures in place to protect the system’s hardware and data.
  15. Cloud Security Assessment: If the system uses cloud-based services, evaluate the security of those services to ensure they are properly secured and protected.

R55,000.00 – R250,000.00*

*This excludes any travel costs